Advertisement
Guest User

Untitled

a guest
Jun 23rd, 2017
107
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 6.63 KB | None | 0 0
  1. Jun 23 19:10:57 debian ipsec[3489]: 09[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V ]
  2. Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] received NAT-T (RFC 3947) vendor ID
  3. Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
  4. Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
  5. Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] received draft-ietf-ipsec-nat-t-ike-00 vendor ID
  6. Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] received XAuth vendor ID
  7. Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] received Cisco Unity vendor ID
  8. Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] received FRAGMENTATION vendor ID
  9. Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] received DPD vendor ID
  10. Jun 23 19:10:57 debian ipsec[3489]: 09[IKE] 178.205.63.179 is initiating a Main Mode IKE_SA
  11. Jun 23 19:10:57 debian ipsec[3489]: 09[ENC] generating ID_PROT response 0 [ SA V V V V ]
  12. Jun 23 19:10:57 debian ipsec[3489]: 09[NET] sending packet: from 172.104.143.35[500] to 178.205.63.179[20675] (160 bytes)
  13. Jun 23 19:10:57 debian ipsec[3489]: 10[NET] received packet: from 178.205.63.179[20675] to 172.104.143.35[500] (252 bytes)
  14. Jun 23 19:10:57 debian ipsec[3489]: 10[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
  15. Jun 23 19:10:57 debian ipsec[3489]: 10[IKE] remote host is behind NAT
  16. Jun 23 19:10:57 debian ipsec[3489]: 10[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
  17. Jun 23 19:10:57 debian ipsec[3489]: 10[NET] sending packet: from 172.104.143.35[500] to 178.205.63.179[20675] (268 bytes)
  18. Jun 23 19:10:57 debian ipsec[3489]: 12[NET] received packet: from 178.205.63.179[20642] to 172.104.143.35[4500] (108 bytes)
  19. Jun 23 19:10:57 debian ipsec[3489]: 12[ENC] parsed ID_PROT request 0 [ ID HASH ]
  20. Jun 23 19:10:57 debian charon[3507]: 16[NET] received packet: from 178.205.63.179[20642] to 172.104.143.35[4500] (140 bytes)
  21. Jun 23 19:10:57 debian ipsec[3489]: 12[CFG] looking for HybridInitRSA peer configs matching 172.104.143.35...178.205.63.179[10.184.115.78]
  22. Jun 23 19:10:57 debian ipsec[3489]: 12[CFG] selected peer config "IKEv1-Xauth"
  23. Jun 23 19:10:57 debian ipsec[3489]: 12[IKE] authentication of 'CN=vpn.krasovsky.me' (myself) successful
  24. Jun 23 19:10:57 debian ipsec[3489]: 12[IKE] sending end entity cert "CN=vpn.krasovsky.me"
  25. Jun 23 19:10:57 debian ipsec[3489]: 12[IKE] sending issuer cert "C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3"
  26. Jun 23 19:10:57 debian ipsec[3489]: 12[ENC] generating ID_PROT response 0 [ ID CERT CERT SIG ]
  27. Jun 23 19:10:57 debian ipsec[3489]: 12[ENC] splitting IKE message with length of 2812 bytes into 3 fragments
  28. Jun 23 19:10:57 debian ipsec[3489]: 12[ENC] generating ID_PROT response 0 [ FRAG(1) ]
  29. Jun 23 19:10:57 debian ipsec[3489]: 12[ENC] generating ID_PROT response 0 [ FRAG(2) ]
  30. Jun 23 19:10:57 debian ipsec[3489]: 12[ENC] generating ID_PROT response 0 [ FRAG(3/3) ]
  31. Jun 23 19:10:57 debian ipsec[3489]: 12[NET] sending packet: from 172.104.143.35[4500] to 178.205.63.179[20642] (1248 bytes)
  32. Jun 23 19:10:57 debian ipsec[3489]: 12[NET] sending packet: from 172.104.143.35[4500] to 178.205.63.179[20642] (424 bytes)
  33. Jun 23 19:10:57 debian ipsec[3489]: 12[ENC] generating TRANSACTION request 890732577 [ HASH CPRQ(X_USER X_PWD) ]
  34. Jun 23 19:10:57 debian ipsec[3489]: 12[NET] sending packet: from 172.104.143.35[4500] to 178.205.63.179[20642] (92 bytes)
  35. Jun 23 19:10:57 debian ipsec[3489]: 11[NET] received packet: from 178.205.63.179[20642] to 172.104.143.35[4500] (124 bytes)
  36. Jun 23 19:10:57 debian ipsec[3489]: 11[ENC] parsed INFORMATIONAL_V1 request 4101358623 [ HASH N(INITIAL_CONTACT) ]
  37. Jun 23 19:10:57 debian ipsec[3489]: 11[NET] received packet: from 178.205.63.179[20642] to 172.104.143.35[4500] (124 bytes)
  38. Jun 23 19:10:57 debian ipsec[3489]: 11[ENC] parsed TRANSACTION response 890732577 [ HASH CPRP(X_USER X_PWD) ]
  39. Jun 23 19:10:57 debian ipsec[3489]: 11[IKE] XAuth authentication of 'savely' successful
  40. Jun 23 19:10:57 debian ipsec[3489]: 11[ENC] generating TRANSACTION request 3042743947 [ HASH CPS(X_STATUS) ]
  41. Jun 23 19:10:57 debian ipsec[3489]: 11[NET] sending packet: from 172.104.143.35[4500] to 178.205.63.179[20642] (92 bytes)
  42. Jun 23 19:10:57 debian ipsec[3489]: 14[NET] received packet: from 178.205.63.179[20642] to 172.104.143.35[4500] (108 bytes)
  43. Jun 23 19:10:57 debian ipsec[3489]: 14[ENC] parsed TRANSACTION response 3042743947 [ HASH CPA(X_STATUS) ]
  44. Jun 23 19:10:57 debian ipsec[3489]: 14[IKE] IKE_SA IKEv1-Xauth[3] established between 172.104.143.35[CN=vpn.krasovsky.me]...178.205.63.179[10.184.115.78]
  45. Jun 23 19:10:57 debian ipsec[3489]: 14[IKE] destroying duplicate IKE_SA for peer 'savely', received INITIAL_CONTACT
  46. Jun 23 19:10:57 debian ipsec[3489]: 14[CFG] lease 192.168.103.1 by 'savely' went offline
  47. Jun 23 19:10:57 debian charon[3507]: 16[ENC] parsed TRANSACTION request 3214253577 [ HASH CPRQ(ADDR MASK DNS NBNS U_BANNER U_DEFDOM U_SPLITDNS U_SPLITINC U_LOCALLAN VER) ]
  48. Jun 23 19:10:57 debian ipsec[3489]: 16[NET] received packet: from 178.205.63.179[20642] to 172.104.143.35[4500] (140 bytes)
  49. Jun 23 19:10:57 debian charon[3507]: 16[IKE] peer requested virtual IP %any
  50. Jun 23 19:10:57 debian charon[3507]: 16[CFG] reassigning offline lease to 'savely'
  51. Jun 23 19:10:57 debian charon[3507]: 16[IKE] assigning virtual IP 192.168.103.1 to peer 'savely'
  52. Jun 23 19:10:57 debian charon[3507]: 16[ENC] generating TRANSACTION response 3214253577 [ HASH CPRP(ADDR DNS DNS DNS6 DNS6) ]
  53. Jun 23 19:10:57 debian charon[3507]: 16[NET] sending packet: from 172.104.143.35[4500] to 178.205.63.179[20642] (140 bytes)
  54. Jun 23 19:10:58 debian charon[3507]: 05[NET] received packet: from 178.205.63.179[20642] to 172.104.143.35[4500] (476 bytes)
  55. Jun 23 19:10:58 debian charon[3507]: 05[ENC] parsed QUICK_MODE request 4039521104 [ HASH SA No ID ID ]
  56. Jun 23 19:10:58 debian charon[3507]: 05[IKE] received 28800s lifetime, configured 0s
  57. Jun 23 19:10:58 debian charon[3507]: 05[ENC] generating QUICK_MODE response 4039521104 [ HASH SA No ID ID ]
  58. Jun 23 19:10:58 debian charon[3507]: 05[NET] sending packet: from 172.104.143.35[4500] to 178.205.63.179[20642] (188 bytes)
  59. Jun 23 19:10:58 debian charon[3507]: 07[NET] received packet: from 178.205.63.179[20642] to 172.104.143.35[4500] (92 bytes)
  60. Jun 23 19:10:58 debian charon[3507]: 07[ENC] parsed QUICK_MODE request 4039521104 [ HASH ]
  61. Jun 23 19:10:58 debian charon[3507]: 07[IKE] CHILD_SA IKEv1-Xauth{3} established with SPIs cbe342bd_i 05d17163_o and TS 0.0.0.0/0 ::/0 === 192.168.103.1/32
  62. Jun 23 19:10:58 debian charon[3507]: 07[IKE] CHILD_SA IKEv1-Xauth{3} established with SPIs cbe342bd_i 05d17163_o and TS 0.0.0.0/0 ::/0 === 192.168.103.1/32
  63. Jun 23 19:10:58 debian vpn[3664]: + 10.184.115.78 192.168.103.1/32 == 178.205.63.179 -- 172.104.143.35 == 0.0.0.0/0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement